-40%

Computer Forensics; Computer Security; Computer Espionage: Lot of 7 Books

$ 5.8

Availability: 100 in stock

Description

Computer Forensics; Computer Security; Computer Espionage – Lot of 7 Books.
If your interested in computer forensics; computer security; computer espionage then this is an excellent collection of books to get you started, or to add to your existing library or reference collection. Six of the books are 1
st
Editions and one is 3
rd
Edition. All the books are in very good condition, there is no page marking, underlining or written notations.
The CD-Rom included with the
Incident Response:Computer Forensics Toolkit
is unused and still in the back cover disk holder.
Books included are:
Secret Software
– Norbert Zaenglein – 1
st
Edition - Paladin Press Book 2000 – ISBN 1-58160-088-7
Making the most of computer resources for data protection, information recovery,forensic examination, crime investigation, and more.
Disk Detective
– Norbert Zaenglein - 1
st
Edition – Paladin Press Book 1998 – ISBN 0-87364-992-3
“Secrets You Must Know to Recover Information from a Computer” –
Disk Detective
is designed to bring the secrets of information recovery to the average person. The author shows what types of information can be recovered and how to recover it from computers.
Spy
c
hips
– Katherine Albrecht & Liz McIntyre - 1
st
Edition 2006 – A Plume Book – ISBN 0-452-28766-
9
Spychips
takes readers into the frightening world of Radio Frequency Identification (RFID), where tiny computer chips may someday replace the bar code,allowing strangers to study your purchasing habits, peek at your medical history, and pinpoint your physical location. Corporations and government agencies have already invested in this technology to track everyday objects – and even people.
Secrets of Computer Espionage:
Tactics and Countermeasures
– Joel McNamara - 1
st
Edition 2003 – Wiley Publishing, Inc. – ISBN 0-7645-3710-5
More and more people today want to know what’s on your computer, your PDA, your cellphone, or your wireless network. McNamara takes you inside the mind of the computer espionage artist – amateur or professional – and shows you appropriate defense for a wide array of potential vulnerabilities. This is the book that teaches you to think like a spy, because that’s the only way to outwit one.
Incident Response:
Computer Forensics Toolkit
- (Includes CD-ROM) – Douglas Schweitzer - 1
st
Edition 2003 – Wiley Publishing, Inc. -ISBN 0-7645-2636-7
Your in-depth guide to detecting network breaches, uncovering evidence, and preventing future attacks.
Schweitzer also provides you with a firm understanding of the methodologies for incident response and computer forensics, Federal Computer Crime Law information and evidence requirements, legal issues, and how to work with law enforcement.
The CD-ROM includes tools to capture forensic data, search volumes, drives, and servers for evidence; and rebuild systems quickly after evidence has been obtained. It includes valuable checklists developed by the author for all aspects of incident response and handling.
Incident Response: Investigating Computer Crime
– Kevin Mandia & Chris Prosise - 1
st
Edition 2003 –McGraw-Hill Companies, Inc. - ISBN 0-07-213182-9
Respond to security breaches and hacker attacks the right way with help from this insightful and practical guide. You’ll get details on the entire computer forensic process and learn the importance of following specific procedures immediately after a computer crime incident. This book will show you how to recognize unauthorized access, uncover unusual or hidden files, and monitor Web Traffic.
Steal This Computer Book 3 –
What They Won’t Tell You About the Internet
– Wallace Wang – 3
rd
Edition 2003 – No Starch Press – ISBN 1-59327-000-3
This book will help you protect yourself. You’ll discover how to tackle spyware, web bugs, and adware. How hackers hide their identities and shred their files. How hackers write computer viruses and worms. How Trojan Horse programs work and how to defend against them. How hackers steal software and defeat copy-protection mechanisms. How to fightback against spammers. How to tell when your machine is being attacked and what you can do to protect it. Where the hackers are,how they probe a target and sneak into a computer, and what they do when they get there.